Working Directory and Files

Establishing a standard for your project structures and files can enhance your workflow with targets and provide the necessary information for executing a series of commands.

Organize your findings and make it available for your attacks.

# Set some ENV variables for potential navigations
export $PROJECT=$HOME/YourProject
export $LHOST=<your attacker PC> 

# Store all Domain information into one directory
~/YourProject
|- Commands        # This is pentesting command library 
|- Findings |- Domains        
            |- ip.txt
            |- hashes.txt
            |- hashes-sevenkingdoms.local
            |- hashes-essos.local
            |- users.txt
            |- users-sevenkingdoms.local
            |- users-essos.local
            |- passwords.txt
            |- passwords-sevenkingdoms.local
            |- passwords-essos.local
|- nmap            # nmap scan output  
|- autorecon       # autorecon scan output 
|- exploit         # Initial foot-hold exploit tools and payloads
|- prviesc         # Privilege Escalation tools and payloads
|- post            # Post-Exploitation tool and payloads 
|- logs            # tmux logs goes here 
|- screenshots     # screenshot pictures 
|- notes           # Random notes here
|- tmp             # scrap files that eventually will be removed 

Last updated